Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix extent map use-after-free when handling missing device in read_one_chunk Store the error code before freeing the extent_map. Though it's reference counted structure, in that function it's the first and last allocation so this would lead to a potential use-after-free. The error can happen eg. when chunk is stored on a missing device and the degraded mount option is missing. Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=216721
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.15, < 5.15.87 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/169a4cf46882974d4db6d85eb623ec898e51bbc0Patch
- https://git.kernel.org/stable/c/1742e1c90c3da344f3bb9b1f1309b3f47482756aPatch
- https://git.kernel.org/stable/c/b8e7ed42bc3ca0d0e4191ee394d34962d3624c22Patch
- https://git.kernel.org/stable/c/fce3713197ebba239e1c7e02174ed216ea1ee014Patch
FAQ
What is CVE-2022-50300?
CVE-2022-50300 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: btrfs: fix extent map use-after-free when handling missing device in read_one_chunk Store the error code before freeing the extent...
How severe is CVE-2022-50300?
CVE-2022-50300 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-50300?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.